IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients. The use of a fee for e-mail has sometimes been called e-mail postage, e-postage, sender pays or e-stamping.Both America Online (AOL) and Yahoo have announced certified  … 
Definition continues below.
Email SecurityReports
151 - 175 of 296 Matches Previous Page  | Next Page
IT Decision Checklist: Messaging Security
sponsored by SearchSecurity.com
EGUIDE: Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
Posted: 03 Mar 2010 | Published: 03 Mar 2010

SearchSecurity.com

Moving Email Management to the Cloud: Understanding IT Transitions
sponsored by Mimecast
WEBCAST: During this Mimecast webinar, you'll gain an understanding of what to look for in a cloud services provider, learn how to identify your own IT transitions points related to their specific email environment, uncover how to address any potential internal security questions when transitioning to a cloud-based service, and more!
Posted: 13 Aug 2010 | Premiered: Aug 13, 2010

Mimecast

E-Discovery, Case Management & Litigation Hold: Comprehensive Archive and Search Capability to Meet Legal and Regulatory Requirements
sponsored by Mimecast
DATA SHEET: Mimecast Unified Email Management™ is a cost effective Software-as-a-Service solution that offers integrated E-Discovery, Litigation Hold and Case Managment functionality, giving you the tools you need to rapidly execute data preservation policies and email discovery requests and guard against the risk of failing to produce required information.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Mimecast

The True Costs of E-mail Encryption
sponsored by Trend Micro
WHITE PAPER: Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more.
Posted: 11 Aug 2010 | Published: 11 Aug 2010

Trend Micro

E-Book: Moving to the Cloud
sponsored by Google
EBOOK: When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps.
Posted: 05 Aug 2010 | Published: 06 Jul 2010

Google

Should Your Email Live In The Cloud? A Comparative Cost Analysis
sponsored by Google
ANALYST REPORT: This report presents a spreadsheet cost model to help you calculate your fully loaded on-premise email costs and compare it against cloud-based alternatives. Bottom line: Cloud-based email makes sense for companies or divisions as large as 15,000 users.
Posted: 05 Aug 2010 | Published: 05 Jan 2009

Google

ESET Mail Security for Microsoft Exchange Server
sponsored by ESET
DATA SHEET: Read this paper to learn how ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed — so slowdowns will be a thing of the past.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

ESET

The Case for NSF - How Archiving in NSF Format Preserves Data Integrity
sponsored by Sherpa Software
WHITE PAPER: The need for archiving electronic records, including electronic mail [email] continues to grow. Large volumes of electronic records, including email, increased storage limitations, government regulations and legal implications have made the need to archive information a critical business issue. Is there a preferred storage format?
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Sherpa Software

eBook: Moving to the Cloud
sponsored by Google Apps
WHITE PAPER: Content provided by Google. When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Google Apps

Why Cloud-Based Security and Archiving Make Sense
sponsored by Google Postini
WEBCAST: Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both.
Posted: 03 Jun 2010 | Premiered: Jun 3, 2010

Google Postini

Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks
sponsored by M86 Security
WHITE PAPER: Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers are constantly finding new ways to access valuable data. They use various tools and methods to evade traditional security products. This brief white paper presents a new security solution that can stop new threats quickly and effectively.
Posted: 27 May 2010 | Published: 30 Oct 2009

M86 Security

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

Managing PST Files: From Discovery to the Archive
sponsored by C2C Systems
WHITE PAPER: As the need to retain corporate data has increased to meet regulatory requirements, the very existence of PST files may put you at risk of failing to meet these legal requirements which could have significant implications. So what can you do about PST files? 
Posted: 20 May 2010 | Published: 20 May 2010

C2C Systems

EMC SourceOne for Microsoft Exchange Server 2010
sponsored by EMC Corporation
DATA SHEET: Microsoft and EMC provide compelling new capabilities for managing your Microsoft Exchange 2010 e-mail, while meeting security, compliance, and eDiscovery requirements.
Posted: 03 May 2010 | Published: 03 May 2010

EMC Corporation

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 21 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro

Microsoft Online: Exchange Online Forum
sponsored by Microsoft
INFORMATION CENTER: Access this discussion board to get with some of the most relevant tasks related to understanding, setting up, and using Microsoft Exchange Online. It will cover capabilities and operation of Exchange Online, both Standard and Deskless.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Microsoft

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 14 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro

Cloud Computing: Best Practices for Migrating to Microsoft Business Productivity Online Suite
sponsored by Dell Software
WHITE PAPER: In this new white paper by Quest Software, learn the best practices for migrating to Microsoft Exchange Online and SharePoint Online from any legacy platform. See why organizations like yours are moving to BPOS. Read this white paper today.
Posted: 30 Mar 2010 | Published: 30 Mar 2010

Dell Software

State of Internet Security, Q3 - Q4 2009
sponsored by Websense, Inc.
WHITE PAPER: Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009.
Posted: 16 Mar 2010 | Published: 16 Feb 2010

Websense, Inc.

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.
Posted: 16 Mar 2010 | Published: 16 Mar 2010

Insight

Presentation Transcript: Showdown in New Mexico, Google Apps vs. Microsoft Exchange
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Read this presentation transcript featuring James Ferreira, CIO for the New Mexico State Attorney General's Office, to learn about migrating to cloud computing applications.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

Google Apps

Securing the Borderless Enterprise
sponsored by Websense, Inc.
PRODUCT OVERVIEW: A completely integrated unified security solution will address Web and email security threats associated with new communication and collaboration tools. It will mitigate the risk of losing valuable business data. It will eliminate the complexity of deploying, managing, and maintaining multiple legacy security products. Read on to learn more.
Posted: 18 Feb 2010 | Published: 04 Feb 2010

Websense, Inc.

10 Cool Things Your Firewall Should Do
sponsored by SonicWALL
WHITE PAPER: This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall.
Posted: 18 Jan 2010 | Published: 18 Nov 2008

SonicWALL

Presentation Transcript: Exchange 2010 Roadmap Series - Backup and Recovery
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In this presentation transcript, featuring Exchange pro, Lee Benjamin, you'll learn how to improve backup and recovery of your Exchange environment. Discover the new features of Exchange 2010 to enhance your backup and recovery efforts. Find out what you should know about clustering and how to avoid common pitfalls.
Posted: 21 Dec 2009 | Published: 21 Dec 2009

Dell, Inc. and Intel®

Key Considerations for Migrating to Exchange 2010
sponsored by EMC Corporation
WHITE PAPER: This white paper addresses the key issues that decision makers should consider as they plan their Exchange 2010 migration. It discusses the results of an in-depth primary research survey conducted by Osterman Research that explores how decision makers are planning their migration to Exchange 2010.
Posted: 21 Dec 2009 | Published: 01 Oct 2009

EMC Corporation
151 - 175 of 296 Matches Previous Page    5 6 7 8 9 10    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  e-mail plans based on a technology developed by Goodmail Systems. For a fee of approximately 1/4 of a cent (USD $0.0025) per e-mail, or USD $2.00 to $3.00 for every 1000 messages sent, advertisers can post e-mail messages that defeat most spam filters commonly used at the server level by Internet service providers (ISPs). Proponents believe that certified e-mail will, if effectively used on a large scale, make spam unprofitable and thereby improve the operation of the Internet by reducing useless electronic traffic.Critics of certified e-mail insist that such a system is not likely to be effective … 
Email Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement